Viruses & Risks

Our security research centers around the world provide unparalleled analysis of and protection from malware, security risks, vulnerabilities, and spam. If you have any thoughts for how we can improve the content on these pages, please take a moment to provide some

Symantec has threat response centers located throughout the world to fight bad guys continuously 24/7. Our STAR team monitors malicious code reports from more than 130 million systems across the Internet, receives data from 240,000 network sensors in more than 200 countries and tracks more than 25,000 vulnerabilities affecting more than 55,000 technologies from more than 8,000 vendors. There are approximately 550 employees in STAR.

Malware as the result of drive-by downloads that bypassed other layers of protection

Malware uses rootkit techniques to hide malware

This eco-system is comprised of the following five areas that work in collaboration:

File-Based Protection continues to play a major role in protection due to new innovations in static file heuristics.

Network-Based Protection detects when both known and unknown vulnerabilities are used to enter your devices’ system.

Behavior-Based Protection looks at the dynamic behavior of malicious activity rather than static characteristics.

Reputation-Based Protection examines the meta-information of a file – its age, origin, how it travels, where it exists, etc.

Remediation is a set of technologies that can help clean up an infected devices system.

The technology collaborates and operates more efficiently and effectively to discover if a given situation is malicious or not. As each technology learns different things about a process or a file, it will share what it learns with the other technologies.

The superheroes and crime fighters of Norton are technically the same folks who build this technology for enterprise customers. All but a few companies in the Fortune 1,000 are customers of Symantec.

Symantec’s Security Technology and Response organization is the division responsible for the innovation and development of Norton’s security technologies that provide protection in five layers: file based (antivirus), network based (firewall), behavior (SONAR), reputation, and remediation.

Who are these Superheroes?

The Security Technology and Response (STAR) is a worldwide team of security engineers; threat analysts and researchers. This team of people is the backbone of our security technology and responds instantly to threats and implement real time updates to your devices to thwart threats as they happen.

What is the Superheroes' secret weapon against threats?

Symantec’s Security Technology and Response team innovates and develops Norton’s security technologies that provide protection to your devices in five layers: file based (antivirus), network based (firewall), behavior (SONAR), reputation, and remediation.

Useful Tools

Ultimate Help Desk 24/7

Don't want to deal with it? Let Norton be your personal IT team, help remove viruses, speed up your PC, or even help update your Operating System, or setup your Pinter, even help sync your smartphone.